Overview
Endpoint Privilege Security is an integral part of the CyberArk Identity Security Platform. Identity Security controls are dynamic and adaptive in nature and ensure the right level of access is given based on risk. CyberArk offers the most complete and extensible Identity Security Platform across workforce and customer access, endpoint privilege security, privileged access management, secrets management, cloud privilege security and identity management to enable Zero Trust and enforce least privilege. In CyberArk's portfolio, Endpoint Privilege Security is enabled by several tightly integrated solutions to ensure seamless operation and smooth user experience. CyberArk Endpoint Privilege Manager is the core CyberArk's offering in Endpoint Privilege Security category.
Endpoint Privilege Manager offers:
- Maturity and relentless innovation.
- Tried and proven mature technologies fused with cutting edge security layers based on own research and emerging threat landscape and industry trends.
- Recognized Industry leader in Privileged Access Management and Identity security.
- Unique protection against browser-targeting attacks for early detection and blocking of browser memory dumping, password and cookie stealing, session hijacking and other types of attack showing explosive growth in popularity.
- Unique defense angles against whole classes of credential-based attacks, including Golden Ticket, Golden SAML, RedLine Stealer and more, provided by Credential Theft Protection and Credential Deception technology.
- Robust multi-layered data-centric anti-ransomware technology with validated efficiency.
- Most complete and extensible identity security platform.
- CyberArk offers the most complete and extensible Identity Security Platform of which Endpoint Privilege Manager is a key component and a fundamental security layer.
- Support for all major workstation and server operating systems: Windows, Windows Server, macOS and Linux.
- Support for all types of workloads: physical, virtual, cloud instances.
- CyberArk technologies are available as a pre-integrated unified endpoint authentication and privilege management solution - Secure Desktop - to help organizations strengthen access security, optimize user experiences, and eliminate the manually intensive, error-prone administrative processes that can lead to overprovisioning and privilege abuse.Architected for the modern enterprise.
- Comprehensive and scalable SaaS architecture.
- Leveraging experience - with CyberArk BluePrint, CyberArk JumpStart service and QuickStart we ensure that we recommend the optimal approach for each deployment and get each customer up and running in no time.
- Impressive record of large truly enterprise deployments. Broadest Integration Support.
- Out-of-the-box policies and integrations, including QuickStart and integrations with other endpoint and network security solutions, identity products, SIEMs and help desk platforms to solve identity security across the organization.
- Threat Detection: these integrations allow leveraging third-party threat intelligence, reputation and analysis, including on-demand sandboxed detonation of potential threats.
- Authentication integrations allow using third-party authentication platforms to ensure verified identity of users during initial and step-up authentications.
- SIEM integrations allow making endpoint privilege events available to SIEMs for ingestion and processing for better context correlation and analysis.
- ITSM platforms help streamline and automate elevation requests.
CyberArk Endpoint Privilege Manager helps you deliver measurable cyber-risk reduction, including protection from ransomware and credential compromise as well as defense of endpoint security agents (such as EDR), by implementing foundational endpoint security controls - removing local admin rights and enforcing role-specific least privilege based on policy. EPM enables operational efficiencies by reducing IT Service Desk load and secure digital transformation by encouraging users' independence and flexibility and aligning security to your business goals. It also satisfies audit and compliance by addressing specific regulation requirements and creating audit trail for identity and privilege use on endpoints.
For custom pricing, EULA, or a private contract, please contact AWS-Marketplace@cyberark.com , for a private offer.
Highlights
- Remove Local Admin Rights. Endpoint Privilege Manager helps remove local admin rights while improving user experience and optimizing IT operations. Flexible policy-based management simplifies privilege orchestration and allows controlled Just-In-Time maintenance sessions. Dangerous software and actions are blocked while approved workflows require no user interaction as elevation is fully automated and transparent to the user.
- Enforce Least Privilege. Comprehensive conditional policy-based application control can help you create safe working environments for every user group, from HR to DevOps. Endpoint Privilege Manager considers application context, parameters, and attributes to allow or block certain script, application or operation.
- Defend against ransomware. EPM prevents deployment and execution of payload, system settings modification and tempering with security agents such as EDR and backup. Closely monitors software execution chain and blocks access to resources to defuse fileless and LOL-based TTPs. Severs CnC communication and network-born encryption by preventing greylisted applications from accessing network. Restricts data access for unknown applications thus preventing encryption and exfiltration of the data.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/12 months |
---|---|---|
Privilege-Endpoint MNGR | Cyberark Privilege-Endpoint Privilege Manager - 100 Users | $11,520.00 |
Vendor refund policy
For refund policy, visit www.cyberark.com/terms-service-saas/
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
Contact CyberArk for support related questions: www.cyberark.com/customer-support/
https://docs.cyberark.com/EPM/Latest/en/Content/LandingPages/LPGetStarted.htm
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.